<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2024.3.1. -->
<schedule>
    <generator name="pretalx" version="2024.3.1" />
    <version>0.37</version>
    <conference>
        <title>NorthSec 2024</title>
        <acronym>2024</acronym>
        <start>2024-05-16</start>
        <end>2024-05-19</end>
        <days>4</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://cfp.nsec.io</base_url>
        
        <time_zone_name>US/Eastern</time_zone_name>
        
        
        <track name="Other" slug="37-other"  color="#5c0c0c" />
        
        <track name="Application security" slug="40-application-security"  color="#2c8d19" />
        
        <track name="Malware" slug="41-malware"  color="#bd7342" />
        
        <track name="Red team" slug="42-red-team"  color="#e71d1d" />
        
        <track name="Hardware" slug="44-hardware"  color="#fffc00" />
        
        <track name="Machine Learning" slug="45-machine-learning"  color="#d1b5f5" />
        
        <track name="Human in the Middle" slug="39-human-in-the-middle"  color="#0892cd" />
        
    </conference>
    <day index='1' date='2024-05-16' start='2024-05-16T04:00:00-04:00' end='2024-05-17T03:59:00-04:00'>
        <room name='Ville-Marie' guid='c461365e-e830-5878-b407-ca43f8ec6564'>
            <event guid='9147122f-51c0-5836-9939-b82ce1925838' id='660'>
                <room>Ville-Marie</room>
                <title>Doors open and Registration - Thursday/Jeudi</title>
                <subtitle></subtitle>
                <type>Long Panel</type>
                <date>2024-05-16T08:00:00-04:00</date>
                <start>08:00</start>
                <duration>01:00</duration>
                <abstract>&#129360; &#9749; &#129391; &#129475; Breakfast sponsored by KeepSec // D&#233;jeuner gr&#226;ce &#224; KeepSec

&lt;img alt=&quot;KeepSec&quot; src=&quot;https://nsec.io/img/partners/keepsec.svg&quot; width=&quot;250px&quot; /&gt;</abstract>
                <slug>2024-660-doors-open-and-registration-thursday-jeudi</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/SSCJ9P/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/SSCJ9P/feedback/</feedback_url>
            </event>
            <event guid='368aab7f-9ecb-596d-8006-e0f2f034f44a' id='643'>
                <room>Ville-Marie</room>
                <title>Conference Introduction</title>
                <subtitle></subtitle>
                <type>Opening Remarks</type>
                <date>2024-05-16T09:00:00-04:00</date>
                <start>09:00</start>
                <duration>00:15</duration>
                <abstract>Opening speech by our President, the Conference VP and our sponsor CyberEco // Discours d&apos;ouverture par le pr&#233;sident, le Vice-pr&#233;sident aux conf&#233;rences et notre partenaire CyberEco</abstract>
                <slug>2024-643-conference-introduction</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/9VXFRJ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/9VXFRJ/feedback/</feedback_url>
            </event>
            <event guid='274680bb-afe7-5f5d-9faa-a21c1073c040' id='641'>
                <room>Ville-Marie</room>
                <title>Technical Analysis Past, Present, and Future - Insights from a Reverse Engineering Perspective</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2024-05-16T09:15:00-04:00</date>
                <start>09:15</start>
                <duration>00:30</duration>
                <abstract>A few helpful notes from over a decade of reverse engineering malware and documenting the process along the way! By the end of this, you will be able to unpack most malware with a single breakpoint... maybe?</abstract>
                <slug>2024-641-technical-analysis-past-present-and-future-insights-from-a-reverse-engineering-perspective</slug>
                <track>Malware</track>
                
                <persons>
                    <person id='503'>Sergei Frankoff</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/UKQ99W/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/UKQ99W/feedback/</feedback_url>
            </event>
            <event guid='ba2096e8-53c3-5eb3-93c2-9d12f9c2c449' id='632'>
                <room>Ville-Marie</room>
                <title>API: Alternate Pathway to Injection</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>00:30</duration>
                <abstract>API Documentation often gives the simplest most bare-bones examples to get something running. This runs into the old adage: *Nothing is more permanent than a temporary solution*. Come join me and walk through a particularly fun example of cloud API documentation showing you the wrong way.

Included will be a deep dive and demo of a vulnerability caused directly by this kind of mistake which maybe shows that Phreaking is alive and well in 2024.</abstract>
                <slug>2024-632-api-alternate-pathway-to-injection</slug>
                <track>Application security</track>
                
                <persons>
                    <person id='492'>Fennix</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/PHSJND/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/PHSJND/feedback/</feedback_url>
            </event>
            <event guid='fe69775e-49a8-5ff5-a023-fe2f831b9603' id='594'>
                <room>Ville-Marie</room>
                <title>Under the Radar: How we found 0-days in the Build Pipeline of OSS Packages</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T10:45:00-04:00</date>
                <start>10:45</start>
                <duration>00:30</duration>
                <abstract>Beyond the buzzword of &apos;supply chain security,&apos; lies a critical, frequently ignored area: the Build Pipelines of Open Source packages. In this talk, we discuss how we&#8217;ve developed a data analysis infrastructure that targets these overlooked vulnerabilities. Our efforts have led to the discovery of 0-days in major OSS projects, such as Terraform providers and modules, AWS Helm Charts, and popular GitHub Actions. We will present a detailed attack tree for GitHub Actions pipelines, offering a deeper analysis than the prior art, and outlining attacks and mitigations. In addition, we will introduce a unique reference for &apos;Living Off the Pipeline&apos; (LOTP) components, aimed at providing Red and Blue teams with a way to prioritize more risky scenarios.</abstract>
                <slug>2024-594-under-the-radar-how-we-found-0-days-in-the-build-pipeline-of-oss-packages</slug>
                <track>Application security</track>
                
                <persons>
                    <person id='334'>Fran&#231;ois Proulx</person><person id='480'>Benoit Cote-Jodoin</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/XY8XKG/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/XY8XKG/feedback/</feedback_url>
            </event>
            <event guid='ecf7e908-beb9-5593-a2f1-e025e4caf296' id='644'>
                <room>Ville-Marie</room>
                <title>AppSec Q&amp;A</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-16T11:30:00-04:00</date>
                <start>11:30</start>
                <duration>00:30</duration>
                <abstract>Q&amp;A Discussion for the AppSec block</abstract>
                <slug>2024-644-appsec-q-a</slug>
                <track>Application security</track>
                
                <persons>
                    <person id='492'>Fennix</person><person id='480'>Benoit Cote-Jodoin</person><person id='334'>Fran&#231;ois Proulx</person><person id='22'>Philippe Arteau</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/PKPLXC/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/PKPLXC/feedback/</feedback_url>
            </event>
            <event guid='3c35812d-a1a5-559b-b15b-76ba52fe6d79' id='612'>
                <room>Ville-Marie</room>
                <title>Ebury, 10 years in: The evolution of a sophisticated Linux server threat</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>00:30</duration>
                <abstract>In 2014, we published a paper about Operation Windigo, where we described a cluster of server-side threats fuelled by Ebury, a backdoor and credential stealer injected into the OpenSSH server and client of compromised servers. That report shed light on web traffic redirections, delivery of Windows malware, and spam campaigns, all using Ebury-compromised servers.

After the arrest and extradition of one of the perpetrators in 2015, some of the monetization activities temporarily stopped, but not all of the botnet&#8217;s activities. Ebury continued to be updated and deployed to tens of thousands of servers each year, to reach a cumulative total of nearly 400,000 victims since 2009, the first year Ebury was seen. Moreover, we have discovered its operators have added more tools to their arsenal, such as Apache modules to exfiltrate HTTP requests or proxy traffic, Linux kernel modules to perform traffic redirections, and modified Netfilter tools to inject and hide firewall rules.

For this investigation we set up honeypots to collect Ebury samples and understand deployment tactics, and partnered with law enforcement. This gave us unique visibility into the perpetrators&#8217; activities, which expanded to include cryptocurrency theft and possibly exfiltration of credit card details. We now have a better understanding of how they expand their botnet not only by stealing credentials, but also by actively trying to compromise the hosting provider&#8217;s infrastructure to deploy malware on all of the providers&#8217; customer-rented servers. In some cases, this resulted in the compromise of tens of thousands of servers, hosting millions of domains.

The latest update to Ebury, versioned 1.8.2, was first seen in January 2024. In the past years, clever userland rootkit functionalities were added to Ebury, which make its detection a lot more difficult than before. From a system administrator&#8217;s perspective, not only is the malware file absent, but none of the resources it uses &#8211; such as processes, sockets, and mapped memory &#8211; are listed when inspecting the system.

This presentation not only reveals the latest toolset of the Ebury gang, but also discusses detection techniques to protect against some of the trickiest Linux threats. Some techniques are specific to Ebury, but most apply to the detection of any userland rootkit.</abstract>
                <slug>2024-612-ebury-10-years-in-the-evolution-of-a-sophisticated-linux-server-threat</slug>
                <track>Malware</track>
                
                <persons>
                    <person id='73'>Marc-Etienne M.L&#233;veill&#233;</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/NWRSZS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/NWRSZS/feedback/</feedback_url>
            </event>
            <event guid='e21fc477-8948-524f-9278-bb85c94c68ed' id='611'>
                <room>Ville-Marie</room>
                <title>Will the real attribution please stand up?</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T13:45:00-04:00</date>
                <start>13:45</start>
                <duration>00:30</duration>
                <abstract>Does attribution of cyber operations actually matter? It depends on who&#8217;s asking. Using real world APT examples from threats attributed to Iran, Turkey, North Korea and Russia, we&#8217;ll demonstrate what details go into attribution work from the perspective of email security vendor, why attribution can be useful for defenders and how Blue Teams can use it to better inform threat modeling and risk. We&apos;ll define attribution, compare the concepts of attribution and Attribution, discuss how softer attribution should be paired with harder, more technical attribution and then close by discussing potential pitfalls we&#8217;ve seen with attribution working for the government, private corporations and at a security vendor.</abstract>
                <slug>2024-611-will-the-real-attribution-please-stand-up-</slug>
                <track>Malware</track>
                
                <persons>
                    <person id='474'>Alexis Dorais-Joncas</person><person id='505'>Greg Lesnewich</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/MG3A7C/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/MG3A7C/feedback/</feedback_url>
            </event>
            <event guid='c0ecd37b-0992-5b7f-a804-3c906bc60743' id='569'>
                <room>Ville-Marie</room>
                <title>Reverse-Engineering Nim Malware: Or a brief tale of analyzing the compiler for a language I had never used</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T14:30:00-04:00</date>
                <start>14:30</start>
                <duration>00:30</duration>
                <abstract>Nim has become the language of choice for a number of libraries and tools used by red-teamers and pentesters. Much like with Mimikatz and Cobalt Strike before, malicious actors have started putting some of the same tooling to their nefarious purposes  . One such example is Mustang Panda, a China-aligned APT that started using Nim to create custom loaders for their Korplug backdoor. For attackers, using a less common language also has benefits when it comes to evading defenses and hindering analysts&#8217; work; we have seen the same thing with the growth of malware written in Go and Rust.
In this presentation, we will go over some of the specific challenges associated with analyzing Nim malware. We will then present tips and tools to help mitigate these difficulties. This will include the presentation of Nimfilt, our analysis script for IDA Pro that we will release shortly before the conference.
Finally, we will demonstrate the use of Nimfilt and other publicly available tools on real malware samples .</abstract>
                <slug>2024-569-reverse-engineering-nim-malware-or-a-brief-tale-of-analyzing-the-compiler-for-a-language-i-had-never-used</slug>
                <track>Malware</track>
                
                <persons>
                    <person id='442'>Alexandre C&#244;t&#233;</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/BP7KTP/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/BP7KTP/feedback/</feedback_url>
            </event>
            <event guid='f9ebbd56-e627-5b72-8555-6a2c1d0ccd74' id='645'>
                <room>Ville-Marie</room>
                <title>Malware Q&amp;A</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-16T15:15:00-04:00</date>
                <start>15:15</start>
                <duration>00:30</duration>
                <abstract>Q&amp;A Discussion for the malware block.</abstract>
                <slug>2024-645-malware-q-a</slug>
                <track>Malware</track>
                
                <persons>
                    <person id='507'>Pierre-Marc Bureau</person><person id='503'>Sergei Frankoff</person><person id='474'>Alexis Dorais-Joncas</person><person id='73'>Marc-Etienne M.L&#233;veill&#233;</person><person id='442'>Alexandre C&#244;t&#233;</person><person id='505'>Greg Lesnewich</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/GV33WS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/GV33WS/feedback/</feedback_url>
            </event>
            <event guid='87dd7cdb-b920-5ed9-a6a1-fa2b8c53c364' id='598'>
                <room>Ville-Marie</room>
                <title>Unveiling the OT Threat Landscape</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-16T16:00:00-04:00</date>
                <start>16:00</start>
                <duration>00:30</duration>
                <abstract>Let us embark you on a journey through the OT Threat Landscape. We will start our voyage by looking at what the global threat landscape looks like today, with a focus on Canadian (and Quebecois) events of note. We will then explore how these landscapes have evolved and the earthquakes that shaped them in recent months and years. We will wrap-up by covering some intelligence-informed takeaways and recommendations on how to weather the incoming rogue waves of the OT ocean.</abstract>
                <slug>2024-598-unveiling-the-ot-threat-landscape</slug>
                <track>Other</track>
                
                <persons>
                    <person id='461'>Camille Felx Leduc</person><person id='509'>Thomas Poinsignon Clavel</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/PUSK7Y/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/PUSK7Y/feedback/</feedback_url>
            </event>
            <event guid='0d2a98e8-c71b-57b7-ba49-afe5374c9a10' id='558'>
                <room>Ville-Marie</room>
                <title>UnRegister Me - Advanced Techniques for hunting and securing user registration vulnerabilities.</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T16:45:00-04:00</date>
                <start>16:45</start>
                <duration>00:30</duration>
                <abstract>In a mobile-first world, user registration using only a phone number has become pretty common, this phone number has become the primary method of authentication due to its convenience and speed. These systems may or may not verify other details about the user, such as their email address and typically rely on Single Sign-On (SSO) identity Providers. 

This talk explores the potential issues that can arise when multiple systems are used for authentication, and how these can lead to vulnerabilities. We will touch upon how authentication and authorization bugs can originate from user registration and how this can lead to full account takeover, password stealing, and denial of service. The speaker will draw from their own experiences in identifying and addressing these vulnerabilities, providing valuable insights into this common issue.

Finally, the talk concludes by discussing potential solutions and stronger controls that can be implemented to prevent these issues from occurring.

Attendee Takeaways 
* Security engineers will gain valuable experience in identifying and addressing authentication bugs, helping them to improve their skills in this area.
* Developers will be encouraged to think more broadly about potential edge cases and vulnerabilities in their applications, leading to stronger and more secure authentication and authorization controls.</abstract>
                <slug>2024-558-unregister-me-advanced-techniques-for-hunting-and-securing-user-registration-vulnerabilities-</slug>
                <track>Other</track>
                
                <persons>
                    <person id='436'>Priyank</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/YVBKMG/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/YVBKMG/feedback/</feedback_url>
            </event>
            <event guid='3b456da2-ac68-51fd-9691-fcda0bf51758' id='665'>
                <room>Ville-Marie</room>
                <title>Gaming on the video wall</title>
                <subtitle></subtitle>
                <type>Announcements</type>
                <date>2024-05-16T18:00:00-04:00</date>
                <start>18:00</start>
                <duration>00:45</duration>
                <abstract>Smash, Mario Kart, who knows...</abstract>
                <slug>2024-665-gaming-on-the-video-wall</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/D3MLCR/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/D3MLCR/feedback/</feedback_url>
            </event>
            <event guid='f812a017-2d7b-5762-b0d2-3b7913df06e2' id='668'>
                <room>Ville-Marie</room>
                <title>Pickpocket Show</title>
                <subtitle></subtitle>
                <type>Party</type>
                <date>2024-05-16T19:30:00-04:00</date>
                <start>19:30</start>
                <duration>00:45</duration>
                <abstract>Come and see James Harrison&apos;s unique craft!

&lt;a href=&quot;https://pickpocketmagic.com&quot; target=&quot;_blank&quot;&gt;https://pickpocketmagic.com&lt;/a&gt;</abstract>
                <slug>2024-668-pickpocket-show</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/G8VANU/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/G8VANU/feedback/</feedback_url>
            </event>
            <event guid='a9ab7fdc-0888-5ec4-ad98-ae39dd94892c' id='667'>
                <room>Ville-Marie</room>
                <title>Electroencephalogram (EEG) Duel</title>
                <subtitle></subtitle>
                <type>Party</type>
                <date>2024-05-16T20:15:00-04:00</date>
                <start>20:15</start>
                <duration>00:45</duration>
                <abstract>Venez d&#233;ployer vos pouvoirs de concentration dans un duel EEG comme vous n&apos;en avez jamais v&#233;cu!</abstract>
                <slug>2024-667-electroencephalogram-eeg-duel</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/8BP3GY/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/8BP3GY/feedback/</feedback_url>
            </event>
            <event guid='b19684d0-ed61-5655-aa6b-7c0b258cd983' id='666'>
                <room>Ville-Marie</room>
                <title>Thursday Party</title>
                <subtitle></subtitle>
                <type>Party</type>
                <date>2024-05-16T21:00:00-04:00</date>
                <start>21:00</start>
                <duration>03:00</duration>
                <abstract>Party with guest DJs from Toronto! // Party avec des performances de DJ de Toronto !

&lt;a href=&quot;/img/contest/2024-party.jpg&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Party poster&quot; src=&quot;/img/contest/2024-party.jpg&quot; width=&quot;250px&quot; /&gt;&lt;/a&gt;</abstract>
                <slug>2024-666-thursday-party</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/UMEVQJ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/UMEVQJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Salle de Bal' guid='350b63ea-43b0-53ed-a01f-32d611f4e8f9'>
            <event guid='0663a4f4-151d-5f03-ab26-786e2d0778e9' id='663'>
                <room>Salle de Bal</room>
                <title>Registration - Thursday/Jeudi</title>
                <subtitle></subtitle>
                <type>Announcements</type>
                <date>2024-05-16T08:00:00-04:00</date>
                <start>08:00</start>
                <duration>01:00</duration>
                <abstract>Refreshments sponsored by KoaSec // Rafraichissements gr&#226;ce &#224; KoaSec

&lt;img alt=&quot;KoaSec&quot; src=&quot;https://nsec.io/img/partners/koasec.png&quot; width=&quot;250px&quot; /&gt;</abstract>
                <slug>2024-663-registration-thursday-jeudi</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/QRZYRE/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/QRZYRE/feedback/</feedback_url>
            </event>
            <event guid='ea2745f3-88bb-5638-ad1d-4a4ab39d3880' id='629'>
                <room>Salle de Bal</room>
                <title>With Great gAIn Comes Greater Security Issues - When ML Frameworks&apos; Scale for Growth Incorporates Security Risks to Users&apos; Cloud Accounts</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>00:30</duration>
                <abstract>There are various Machine Learning/BigData frameworks that have become quite popular in the past year due to the release of ChatGPT. This sudden popularity has caused that the scale for growth in parallel computing comes first and leaves aside the implementation of security mechanisms in some of the frameworks&apos; components. In this talk I will go over the research process that I performed on one of these frameworks in an AWS install, showing how it started as two vulnerabilities in a web dashboard and quickly became privilege escalation in an AWS account.</abstract>
                <slug>2024-629-with-great-gain-comes-greater-security-issues-when-ml-frameworks-scale-for-growth-incorporates-security-risks-to-users-cloud-accounts</slug>
                <track>Machine Learning</track>
                
                <persons>
                    <person id='491'>Berenice Flores</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/39KUWQ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/39KUWQ/feedback/</feedback_url>
            </event>
            <event guid='358173a4-174a-5982-a2a9-24d94c7f6b62' id='599'>
                <room>Salle de Bal</room>
                <title>What&apos;s New is Old - Parallels of OWASP&apos;s Top 10 for LLMs and Web Applications</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T10:45:00-04:00</date>
                <start>10:45</start>
                <duration>00:30</duration>
                <abstract>LLMs are the hot new thing, and are exciting enough to even have their own OWASP Top 10 as of 2023! But are these vulnerabilities really any different from what we already see in more traditional web applications? 

In this talk, Logan will explore the different vulnerability families from the new OWASP Top 10 for LLM Applications, discuss the different scenarios represented therein with a focus on real-world exploitation scenarios, and outline how they parallel the vulnerabilities that we&apos;ve all grown to love and pwn over the years.

Attendees should leave this talk with a more complete understanding of the vulnerabilities manifesting in LLM applications, how these vulnerabilities can directly affect end users, and scenarios to be conscious of when developing for, or around, LLM applications.</abstract>
                <slug>2024-599-what-s-new-is-old-parallels-of-owasp-s-top-10-for-llms-and-web-applications</slug>
                <track>Machine Learning</track>
                
                <persons>
                    <person id='375'>Logan MacLaren</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/FQ3YZB/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/FQ3YZB/feedback/</feedback_url>
            </event>
            <event guid='a5f3743b-5867-52c5-8162-4615915f4e49' id='647'>
                <room>Salle de Bal</room>
                <title>Machine Learning Q&amp;A</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-16T11:30:00-04:00</date>
                <start>11:30</start>
                <duration>00:30</duration>
                <abstract>Q&amp;A Discussion for the Machine Learning (ML) block.</abstract>
                <slug>2024-647-machine-learning-q-a</slug>
                <track>Machine Learning</track>
                
                <persons>
                    <person id='506'>Fran&#231;ois Labr&#232;che</person><person id='491'>Berenice Flores</person><person id='375'>Logan MacLaren</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/QHV3MR/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/QHV3MR/feedback/</feedback_url>
            </event>
            <event guid='7d4ddddf-4e71-5eac-991b-9cf2bf7d7087' id='557'>
                <room>Salle de Bal</room>
                <title>Hardware Hacking Curiosity</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>00:30</duration>
                <abstract>This talk, centered around curiosity and its transformative power, reflects my personal exploration into uncharted territories, an area that few people are familiar with. Surprisingly, I had no prior experience with hardware hacking; everything I&apos;ve learned so far, starting from scratch, thanks to countless YouTube tutorials and extensive PDF books. 

I&apos;m excited to share my discoveries and experiences thus far, highlighting the potential that curiosity holds in reshaping one&apos;s path. This talk aims to provide you with the fundamentals of protocols, types of devices, and the equipment needed to start. Additionally, I will guide you on how to undertake your first hardware hacking project on a connected device. **Are you up for joining me on this adventure?**</abstract>
                <slug>2024-557-hardware-hacking-curiosity</slug>
                <track>Hardware</track>
                
                <persons>
                    <person id='435'>Adrien Lasalle</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/GKD9AL/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/GKD9AL/feedback/</feedback_url>
            </event>
            <event guid='4b389ec2-6cb1-5bd4-a042-67aa1e61fb04' id='559'>
                <room>Salle de Bal</room>
                <title>Scrutiny Debugger - Debug, test and configure embedded softwares through instrumentation</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T13:45:00-04:00</date>
                <start>13:45</start>
                <duration>00:30</duration>
                <abstract>Debugging and testing an embedded application is always painful. A serial `printf` might not be enough, a high end JTAG with 1000+ pages of documentation might be too costly or complex. 

Scrutiny Debugger is a new open source project that offers an alternative by enabling remote control of the memory through any communication channel (Serial, UDP, etc.). How does that work? A Python server continuously communicates with an embedded application that runs a small instrumentation library. Using the debugging symbols, extracted at compile time, the server exposes all the variables and memory structure to client applications through a websocket API.  2 clients are available: an Electron GUI and a Python SDK for programmatic interaction with the server.

Clients can read/write variables or raw memory. They can do graphs of variables; being continuous time logging or embedded graphs that triggers on a specific variable change, like an electronic scope does. Not the best for low-level driver development; but ideal for high-level embedded application.

The Python SDK is fully synchronized with the target device, meaning that a Python script can remotely run and behave like it was an internal thread inside the device; but with slow memory access time. That powerfully enables HIL (Hardware-in-the-loop) testing.</abstract>
                <slug>2024-559-scrutiny-debugger-debug-test-and-configure-embedded-softwares-through-instrumentation</slug>
                <track>Hardware</track>
                
                <persons>
                    <person id='437'>Pier-Yves Lessard</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/SJYV3M/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/SJYV3M/feedback/</feedback_url>
            </event>
            <event guid='28245179-22bc-5984-86bb-b37268e54d94' id='646'>
                <room>Salle de Bal</room>
                <title>Hardware Q&amp;A</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-16T14:30:00-04:00</date>
                <start>14:30</start>
                <duration>00:30</duration>
                <abstract>Q&amp;A Discussion for the hardware block</abstract>
                <slug>2024-646-hardware-q-a</slug>
                <track>Hardware</track>
                
                <persons>
                    <person id='59'>Marc-Andr&#233; Labont&#233;</person><person id='437'>Pier-Yves Lessard</person><person id='435'>Adrien Lasalle</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/73ADLS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/73ADLS/feedback/</feedback_url>
            </event>
            <event guid='c4621609-f432-5acb-a994-00d6ce930a47' id='600'>
                <room>Salle de Bal</room>
                <title>Insert coin: Hacking arcades for fun</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T15:15:00-04:00</date>
                <start>15:15</start>
                <duration>00:30</duration>
                <abstract>Since we were children we wanted to go to the arcade and play for hours and hours for free. How about we do it now? In this talk I&#8217;m gonna show you some vulnerabilities that I discovered in the cashless system of one of the biggest companies in the world, with over 2,300 installations across 70 countries. We will talk about api security, access control and nfc among other things.</abstract>
                <slug>2024-600-insert-coin-hacking-arcades-for-fun</slug>
                <track>Other</track>
                
                <persons>
                    <person id='463'>Ignacio Navarro</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/GG8DUB/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/GG8DUB/feedback/</feedback_url>
            </event>
            <event guid='6ccf8069-ab2a-594f-8a70-5bdc67e91351' id='603'>
                <room>Salle de Bal</room>
                <title>Crowdsourced DDoS Attacks Amid Geopolitical Events</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-16T16:00:00-04:00</date>
                <start>16:00</start>
                <duration>00:30</duration>
                <abstract>This talk examines the rise of crowdsourced DDoS attacks amid geopolitical events, focusing on the Russia-Ukraine and Israel-Hamas conflicts. Once the domain of well-resourced actors, large-scale attacks now involve networks of novices using open-source tools, provided there are enough individuals sympathetic to a particular political ideology or cause. To incentivize participation, hacktivists employ leaderboards, cryptocurrency rewards, and gamified ranking systems based on contributions to DDoS attacks. This transforms disruptive criminal attacks against services into a competitive and commoditized activity.</abstract>
                <slug>2024-603-crowdsourced-ddos-attacks-amid-geopolitical-events</slug>
                <track>Other</track>
                
                <persons>
                    <person id='466'>Zaid Osta</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/M8M8VJ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/M8M8VJ/feedback/</feedback_url>
            </event>
            <event guid='1631d683-98eb-5b75-8e30-36a14f794e22' id='593'>
                <room>Salle de Bal</room>
                <title>Cyber Incident Command System: A Firefighter&apos;s Approach to Managing Cyber Incidents</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-16T16:45:00-04:00</date>
                <start>16:45</start>
                <duration>00:30</duration>
                <abstract>Let&apos;s face it, responding to cyber incidents is full of challenges but managing the dreaded &quot;war room&quot; shouldn&apos;t have to be one of them. In this talk AJ Jarrett, Incident Response Director at DTCC and former firefighter will discuss how cybersecurity and IT teams can leverage the tactics and techniques used by first responders during disasters to bring cyber incident response to the next level.</abstract>
                <slug>2024-593-cyber-incident-command-system-a-firefighter-s-approach-to-managing-cyber-incidents</slug>
                <track>Other</track>
                
                <persons>
                    <person id='459'>AJ Jarrett</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/83TKPA/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/83TKPA/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop 1' guid='341e5ac0-0ff7-5a52-8084-5875a97825ba'>
            <event guid='69e33000-bff0-5cf6-8845-aa06c4076b87' id='570'>
                <room>Workshop 1</room>
                <title>Mastering Exegol</title>
                <subtitle></subtitle>
                <type>2hr workshop -- Round 2 [FR]</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>Apprenez &#224; r&#233;aliser des tests d&apos;intrusion de mani&#232;re s&#233;curis&#233;e, professionnelle et efficace avec Exegol. Prenez une longeur d&apos;avance en suivant ce training qui se concentrera sur la mani&#232;re dont les professionnels peuvent facilement configurer et utiliser leur environnement de test d&apos;intrusion, bas&#233; sur Docker, en quelques minutes, sans difficult&#233;. 
L&apos;&#233;poque des tests d&apos;intrusion non professionnels, non s&#233;curis&#233;s et laborieux est r&#233;volue.</abstract>
                <slug>2024-570-mastering-exegol</slug>
                <track></track>
                
                <persons>
                    <person id='372'>Charlie Bromberg (Shutdown)</person><person id='502'>Mathieu Calemard du Gardin (Dramelac)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/GU3KTM/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/GU3KTM/feedback/</feedback_url>
            </event>
            <event guid='5b0f939b-3280-5f89-a381-e38259a2bd06' id='582'>
                <room>Workshop 1</room>
                <title>How crypto gets broken (by you)</title>
                <subtitle></subtitle>
                <type>3hr workshop -- Round 1  [EN]</type>
                <date>2024-05-16T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>03:00</duration>
                <abstract>This is an introduction to crypto: building blocks, protocols and attacks on them. We cover: encoding vs encryption, hashes, &#8216;classic&#8217; crypto, stream ciphers, block ciphers, symmetric crypto, asymmetric crypto, has attacks, classic crypto attacks, stream cipher attack, block cipher attack models, ECB attacks, crypto protocols, digital signatures, message authentication code, nonces, simple authentication, challenge response, simple authentication attacks (key collisions, key extraction and extension, replay, valet, bad counter resync), MAC attacks, digital signature attacks, pubkey substitution, challenge response attacks (middleperson attack, UDS style seed-key predictions), WPA2 password cracking, WPA2 key reinstallation, WPA2 key nulling, TLS/SSL middleperson attacks, SWEET32, DROWN, logjam, POODLE, UDS seed-key exchange attacks (reverse key algorithm, lift key algorithm, solve for unknowns, retry-retry-retry, brute force, glitch past).

Tools covered include: rumkin.com, hashcat, john the ripper, binwalk, radare2, binvis.io, Veles, airocrack-ng, mitmproxy, MITMf.

The workshop is a &#8216;101&#8217; level: geared for people good at computers but maybe no knowledge of cryptography. There will be minimal math (I promise). We&#8217;ll talk mostly about how to break bad crypto and bad crypto algorithms with 10-15min hands-on sessions integrated into 4 hours of workshop: Decrypt &#8216;Crypto&#8217;, Break Hashes, Break Crypto, Visualize Crypto.

We will explore three applications of the building blocks and attacks also. Towards the end we tie-in the building blocks and attacks into how the following crypto protocols get broken: WPA2, TLS and UDS Seed-Key exchange (from automotive). Please join us for an intro-level exploration of cryptography building blocks, protocols and how to attack them. And, as always, crypto means cryptography.</abstract>
                <slug>2024-582-how-crypto-gets-broken-by-you-</slug>
                <track></track>
                
                <persons>
                    <person id='36'>Ben Gardiner</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/GHC8F9/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/GHC8F9/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop 2' guid='533f67c8-e191-5bf5-9ef8-83c3f477739b'>
            <event guid='76e6ea01-4b43-5b85-b232-44fb6b05d703' id='616'>
                <room>Workshop 2</room>
                <title>Prevent First, Detect Second: An Open-Source Approach</title>
                <subtitle></subtitle>
                <type>2 hr workshop -- Round 2 [EN]</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>As the authors of this talk can testify from experience, it feels almost impossible to detect cyberattacks, let alone stop them. Alert fatigue and a shortage of automation, skills, and personnel further exacerbate this problem, emphasizing the need for prevention mechanisms that allow defenders time to investigate threats.

Incident response, even if automated, is best done after an attack has already been thwarted. Easier said than done? Not really if you use the right tools!

The right tools we will discuss in this talk are our open-source RPC-Firewall and LDAP-Firewall.
First, we prevent! We show how these tools can be used in every Microsoft domain environment to halt innumerable attacks throughout the kill chain. We can stop the initial stages of an attack by preventing domain enumerations via SharpHound, BloodHound.py, SOAPHound, and various LDAP queries. We can also prevent numerous types of privilege escalation and lateral movement attacks, including DCSync attacks, remote DCOM execution, PsExec, PetitPotam attacks, Coercing attacks, and many more&#8230;

Second, we detect! Our open-source tools write Windows events to the local event logs, which can be easily forwarded to your local SIEM. The RPC Firewall and LDAP Firewall also have their own Sigma rules published for them, making detection engineering even simpler. Using Sentinel as an example, we show how these events can be ingested into any SIEM, how baselines can be easily created, and how detection rules are formulated.

Finally, we will summarize with RPC and LDAP firewall internals, which will help guide the security community on how to better contribute, expand, and customize these open-source tools to bring more value to the community.</abstract>
                <slug>2024-616-prevent-first-detect-second-an-open-source-approach</slug>
                <track></track>
                
                <persons>
                    <person id='236'>Sagie</person><person id='399'>Dekel Paz</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/Z9TZAS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/Z9TZAS/feedback/</feedback_url>
            </event>
            <event guid='302869ba-c0cb-5707-9044-f334580c05c3' id='658'>
                <room>Workshop 2</room>
                <title>Examen radioamateur Comp&#233;tence de Base / Amateur Radio Basic Competency Exam</title>
                <subtitle></subtitle>
                <type>2 hr workshop -- Round 1 [FR]</type>
                <date>2024-05-16T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>01:30</duration>
                <abstract>Une opportunit&#233; inestimable pour ceux qui aspirent &#224; obtenir leur licence de radioamateur - passez l&apos;examen pour la comp&#233;tence de base durant Northsec! 
--
An invaluable opportunity for those aspiring to obtain their amateur radio license - take the basic competency exam during Northsec!</abstract>
                <slug>2024-658-examen-radioamateur-comptence-de-base-amateur-radio-basic-competency-exam</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/ZE837Z/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/ZE837Z/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Salle de la Commune' guid='91c72a02-5477-53b5-be2a-f89fcc3ad7a2'>
            <event guid='16a620e3-5fab-5c17-9aa4-0838bc274d2e' id='654'>
                <room>Salle de la Commune</room>
                <title>Thursday Community Booths / Kiosques communautaires du jeudi</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>07:30</duration>
                <abstract>English below

Vous &#234;tes cordialement invit&#233;s &#224; venir explorer la salle communautaire, o&#249; la convergence de la technologie, de l&apos;amusement et de l&apos;apprentissage vous attend. Que vous soyez un amateur de jeux, un technophile averti ou simplement curieux de d&#233;couvrir de nouvelles choses, on vous y attend!

D&#233;couvrez nos kiosques :

* Guys, Games and Beer (G2B)
* Cybercap
* Jeux de table
* &#201;changes d&apos;auto-collants
* Foulab
* Crochetage de serrures
* Vol &#224; la tire : De retour pour une troisi&#232;me ann&#233;e, James Harrison r&#233;alisera ses techniques de prestidigitation &#233;poustouflantes de pr&#232;s. Vous pourriez m&#234;me apprendre un tour ou deux !
* Atelier de CV

et plus encore

//  English //
You are cordially invited to come explore the community hall, where the convergence of technology, fun, and learning awaits you. Whether you&apos;re a gaming enthusiast, a seasoned technophile, or simply curious to discover new things, we&apos;ll be expecting you there!

* Guys, Games and Beer (G2B)
* Cybercap 
* Tabletop games
* Sticker exchange
* Foulab
* Lockpicking
* Pickpocketing : Come learn and be amazed by Canada&apos;s Pickpocket Magician! Back for a third year, James Harrison will perform his mindblowing sleigh of hand techniques up close. You might even learn a trick or two!
* HR village

and much more!</abstract>
                <slug>2024-654-thursday-community-booths-kiosques-communautaires-du-jeudi</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/MCEMZU/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/MCEMZU/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Studio Podcast' guid='af5b197c-5ade-5b2e-bd06-555ed6704952'>
            <event guid='3c4b82e7-2823-5c5c-b8b5-03b23d92c076' id='659'>
                <room>Studio Podcast</room>
                <title>Enregistrement du podcast PolyS&#233;cure</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-16T15:00:00-04:00</date>
                <start>15:00</start>
                <duration>01:00</duration>
                <abstract>PolyS&#233;cure est un podcast francophone sur la cybers&#233;curit&#233; qui s&apos;adresse aux professionels et curieux depuis 2020.

Le podcast se s&#233;pare en six grands segments:

    Curieux: Segment destin&#233; au grand public, afin de vulgariser des sujets pointus et qui peuvent sembler herm&#233;tique
    PME: Segment pour les petites et moyennes entreprises, o&#249; les d&#233;fis de cybers&#233;curit&#233; sont existants, mais o&#249; les ressources sont limit&#233;es
    Professionnel: Segment pour ceux qui &#339;uvrent dans le domaine de la cybers&#233;curit&#233; ou dans un domaine connexe
    Teknik: Segment pour ceux qui d&#233;sire approfondir des sujets pointus en cybers&#233;curit&#233;
    Juridik: Segment abordant les questions juridiques (rappel, nous ne donnons pas de conseil juridique, veuillez consulter votre avocat pour une opinion juridique) qui affectent l&apos;univers des technologies et de la cybers&#233;curit&#233;. Nous y abordons r&#233;guli&#232;rement des sujets relatifs &#224; la vie priv&#233;e et aux lois qui la prot&#232;ge.
    H&apos;umain: Segment qui place l&apos;humain au centre des pr&#233;occupations, puisque celui-ci n&apos;est pas le maillon faible, mais le maillon fort de la cybers&#233;curit&#233;.

Tous les &#233;pisodes et notes de recherche se trouvent &#224; polysecure.ca</abstract>
                <slug>2024-659-enregistrement-du-podcast-polyscure</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/XTWAAJ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/XTWAAJ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Sc&#232;ne de la Commune' guid='b1da90d6-0a93-5b0a-a07e-3fa357a1d968'>
            <event guid='6ae639d2-a9f3-53e3-abef-ae5b7086c802' id='653'>
                <room>Sc&#232;ne de la Commune</room>
                <title>CTF 101</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>03:00</duration>
                <abstract>(English follows) Vous souhaitez d&#233;couvrir les bases du CTF (Capture The Flag) ? Rejoignez-nous pour un atelier pratique qui vous permettra de plonger dans cet univers passionnant m&#234;me en tant que d&#233;butant. Apprenez les fondamentaux du CTF et familiarisez-vous avec ses m&#233;canismes lors de cet atelier interactif. Venez essayer par vous-m&#234;me et laissez-vous emporter par l&apos;excitation du challenge ! Atelier en fran&#231;ais.


Are you eager to discover the fundamentals of CTF (Capture The Flag)? Join us for a hands-on workshop designed to help beginners make the most out of the CTF experience. Learn the basics of CTF and get acquainted with its mechanics in this interactive session. Come give it a try and immerse yourself in the thrill of the challenge!</abstract>
                <slug>2024-653-ctf-101</slug>
                <track></track>
                
                <persons>
                    <person id='504'>Simon Nolet (Viper)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/SEQ3S9/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/SEQ3S9/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Soldering Village' guid='d5a7e161-7991-5141-884f-e29c468b56dc'>
            <event guid='b82b9fc3-6dd5-5864-98f1-1915f9966a37' id='655'>
                <room>Soldering Village</room>
                <title>Soldering workshop / Atelier de soudure</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-16T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>02:00</duration>
                <abstract>REGISTRATION REQUIRED HERE / INSCRIPTION OBLIGATOIRE ICI : https://tickets.nsec.io/2024/

Soldering (EN below) / Soudure (brasage)

Rejoignez-nous pour un atelier pratique de brasage o&#249; vous d&#233;couvrirez les secrets de vos badges (apportez votre badge Sputnik ou Cerveau!). 

Dans cet atelier passionnant, vous apprendrez les techniques de brasage tout en donnant une nouvelle vie &#224; vos badges. Apprenez &#224; hacker votre badge pour lui donner de nouvelles fonctionnalit&#233;s et le personnaliser. 

C&apos;est une occasion unique de d&#233;velopper vos comp&#233;tences en &#233;lectronique tout en repartant avec un souvenir unique et personnalis&#233; ! L&apos;atelier sera offert en anglais.

INSCRIPTION OBLIGATOIRE ICI : https://tickets.nsec.io/2024/



Join us for a hands-on soldering workshop where you&apos;ll uncover the secrets of crafting your own electronic badge - bring your Brain or Sputnik badge if you have one! 

In this exciting workshop, you&apos;ll learn soldering techniques while breathing new life into your (Sputnik/Brain) badge. Learn to hack your badge to add new features and customize it to your heart&apos;s content. It&apos;s a unique opportunity to enhance your electronics skills while walking away with a one-of-a-kind, personalized keepsake!

(an additional fee is required to cover the cost of materials, REGISTRATION REQUIRED HERE  : https://tickets.nsec.io/2024/</abstract>
                <slug>2024-655-soldering-workshop-atelier-de-soudure</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/LPRPBQ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/LPRPBQ/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2024-05-17' start='2024-05-17T04:00:00-04:00' end='2024-05-18T03:59:00-04:00'>
        <room name='Ville-Marie' guid='c461365e-e830-5878-b407-ca43f8ec6564'>
            <event guid='513796f0-1d0b-5b0d-810e-aa86e22baae4' id='661'>
                <room>Ville-Marie</room>
                <title>Doors open and Registration - Friday/Vendredi</title>
                <subtitle></subtitle>
                <type>Long Panel</type>
                <date>2024-05-17T08:00:00-04:00</date>
                <start>08:00</start>
                <duration>01:00</duration>
                <abstract>&#129360; &#9749; &#129391; &#129475; Breakfast sponsored by IMC2 // D&#233;jeuner gr&#226;ce &#224; l&apos;IMC2

&lt;img alt=&quot;IMC2&quot; src=&quot;/img/partners/imc2.png&quot; width=&quot;250px&quot; /&gt;</abstract>
                <slug>2024-661-doors-open-and-registration-friday-vendredi</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/EYVXJW/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/EYVXJW/feedback/</feedback_url>
            </event>
            <event guid='dba4a425-0ea7-5f15-86c1-79fd348eac09' id='564'>
                <room>Ville-Marie</room>
                <title>BEWARE of Infosec Influencers</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-17T09:15:00-04:00</date>
                <start>09:15</start>
                <duration>00:30</duration>
                <abstract>Many are aware of clout-chasing influencers on social media such. However, many have not considered this cultural phenomenon transcending into the professional world. From &quot;thought leaders&quot; on LinkedIn to law enforcement agencies on Twitter, it is not just Instagram models sharing content with the primary goal of getting more &apos;likes&apos; and followers. In this presentation, Mr. Myler highlights examples of Infosec influencers providing guidance that, at best, distracts from prioritized risk-based cybersecurity.</abstract>
                <slug>2024-564-beware-of-infosec-influencers</slug>
                <track>Human in the Middle</track>
                
                <persons>
                    <person id='439'>W. Garrett Myler</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/ULDTDX/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/ULDTDX/feedback/</feedback_url>
            </event>
            <event guid='c06b4af1-041f-563c-a342-328d750c2cf9' id='583'>
                <room>Ville-Marie</room>
                <title>Real or fake? Tools to fight online disinformation</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-17T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>00:30</duration>
                <abstract>It is quite challenging to verify the origin of online content. In this era of disinformation exacerbated by ever-evolving AI tools, the creation of seemingly authentic fake accounts and content can be quite dangerous, with risks ranging from harming one&#8217;s reputation to damaging society as a whole.
Fortunately, content provenance technologies are emerging to fight this problem. The [Coalition for Content Provenance and Authenticity (C2PA)](https://c2pa.org/) is the leading effort allowing creators to cryptographically sign their digital assets and record subsequent edits helping consumers to confirm their origin and authenticity while keeping an auditable history of the data transformations. It has been adopted by leading technology providers (Microsoft, Google, Meta), camera manufacturers (Sony, Nikon), image/video editors (Adobe), generative AI companies (OpenAI, Midjourney), and news organizations (BBC, CBC/Radio-Canada, New York Times). C2PA is also at the forefront of the fight against election disinformation, and was one of two technologies mentioned in the recent [AI Elections accord](https://www.aielectionsaccord.com/) signed at the Munich security conference.
In this presentation, I&#8217;ll describe the C2PA use cases, specifications, and the lifecycle of a protected digital asset (such as images, videos, and audio clips) from their creation, to their modifications and validation. I&#8217;ll present open-source tools/SDKs that anyone can use to create and verify protected content or integrate this functionality in their applications and services.
I&#8217;ll also present the [Cross-Platform Origin of Content (XPOC)](https://microsoft.github.io/xpoc-framework/) framework allowing content owners to create authoritative lists of their social media accounts and content, addressing a slightly different provenance problem. I&#8217;ll give a demonstration of the open-source tools allowing anyone to self-host and verify XPOC manifests.</abstract>
                <slug>2024-583-real-or-fake-tools-to-fight-online-disinformation</slug>
                <track>Human in the Middle</track>
                
                <persons>
                    <person id='108'>Christian Paquin</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/JPBGZJ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/JPBGZJ/feedback/</feedback_url>
            </event>
            <event guid='c859265b-7f81-5c1c-ad34-0c1e71db5764' id='610'>
                <room>Ville-Marie</room>
                <title>I will look for you and I will find you: OSINT on publicly shared pictures</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-17T10:45:00-04:00</date>
                <start>10:45</start>
                <duration>00:30</duration>
                <abstract>Liam Neeson is coming for you. But how will he find you? Come to this talk to learn how the picture of a firetruck you took in front of your house and shared on Instagram two years ago will be the source of your demise.

In this talk, I will share how I developed this compulsive habit, in which I _need_ to find where a picture was taken. We will cover how to perform _open-source intelligence_ (OSINT) on publicly shared pictures and videos, which tools and techniques to use, accompanied with real step-by-step examples.

I believe that understanding how OSINT works is key to better protect ourselves online. I&apos;m aiming to give you the tools and knowledge to be better cybersecurity professionals, and learn to be more careful and diligent online, all in a (hopefully) fun and engaging way.

Not convinced yet? This talk will also cover the following topics: metadata (d&apos;oh!), physical keys (who doesn&apos;t like keys?), data in public registries, and conclude with Do&apos;s and Don&apos;ts for everyone.</abstract>
                <slug>2024-610-i-will-look-for-you-and-i-will-find-you-osint-on-publicly-shared-pictures</slug>
                <track>Human in the Middle</track>
                
                <persons>
                    <person id='473'>Patricia Gagnon-Renaud</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/X7YUFZ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/X7YUFZ/feedback/</feedback_url>
            </event>
            <event guid='f4f69ece-99ab-5d5c-af9a-28ad3d8b3f31' id='649'>
                <room>Ville-Marie</room>
                <title>Human in the Middle Q&amp;A</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-17T11:30:00-04:00</date>
                <start>11:30</start>
                <duration>00:30</duration>
                <abstract>Q&amp;A Discussion for the Human in the Middle block.</abstract>
                <slug>2024-649-human-in-the-middle-q-a</slug>
                <track>Human in the Middle</track>
                
                <persons>
                    <person id='508'>Octavia Hexe</person><person id='473'>Patricia Gagnon-Renaud</person><person id='439'>W. Garrett Myler</person><person id='108'>Christian Paquin</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/YU9CN7/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/YU9CN7/feedback/</feedback_url>
            </event>
            <event guid='99153fb3-2e06-5a93-b1a6-9276b9cbe511' id='555'>
                <room>Ville-Marie</room>
                <title>Browser is the new LSASS</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-17T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>00:30</duration>
                <abstract>In a world where MFA is enabled on every portal and everything is a web application, red teamers can access cookies and cached information from your browser to gain access to everything without knowing a simple password or having access to your MFA.</abstract>
                <slug>2024-555-browser-is-the-new-lsass</slug>
                <track>Red team</track>
                
                <persons>
                    <person id='11'>Charles F. Hamilton (Mr.Un1k0d3r)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/QFMWVQ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/QFMWVQ/feedback/</feedback_url>
            </event>
            <event guid='a13968fb-2c2e-5060-ac37-5ad3d853aa4a' id='591'>
                <room>Ville-Marie</room>
                <title>Simplified Malware Evasion - Entropy and other Techniques</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-17T13:45:00-04:00</date>
                <start>13:45</start>
                <duration>00:30</duration>
                <abstract>Malware development and evasion techniques are becoming more difficult each day. EDRs are implementing signature-based detection, behaviour-based detection, as well as entropy-based detection techniques. Shellcode is often encoded/encrypted which can cause payloads to have high entropy (randomness), therefore being detected and blocked by EDRs.
 
This presentation is the journey of a red teamer - improving their tools with simple techniques and learning about evasion and Windows internals along the way. 

Through this talk, we will review the high-level theory behind evasion and present unique approaches to evasion techniques, including entropy reduction and shellcode callbacks. We will present a novel tool to reduce entropy via dictionary word shellcode encoding, and use Windows callback functions to launch our shellcode.

Furthermore, an overview of detecting these novel techniques will be discussed to help blue teamers in their jobs. Detection methods discussed include using YARA rules, ETW, and PE file memory scanners.

Participants will benefit from this talk in many ways. Red teamers can now immediately benefit from the tool, which is publicly released, along with C#/C++ Code samples. And Blue teamers can learn how to better detect these advanced techniques.</abstract>
                <slug>2024-591-simplified-malware-evasion-entropy-and-other-techniques</slug>
                <track>Red team</track>
                
                <persons>
                    <person id='214'>Will Summerhill</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/DMJEK9/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/DMJEK9/feedback/</feedback_url>
            </event>
            <event guid='66037c3c-6f59-56b4-8af3-f571aca94958' id='648'>
                <room>Ville-Marie</room>
                <title>Red Team Q&amp;A</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-17T14:30:00-04:00</date>
                <start>14:30</start>
                <duration>00:30</duration>
                <abstract>Q&amp;A Discussion for the red team block.</abstract>
                <slug>2024-648-red-team-q-a</slug>
                <track>Red team</track>
                
                <persons>
                    <person id='23'>Laurent Desaulniers</person><person id='214'>Will Summerhill</person><person id='11'>Charles F. Hamilton (Mr.Un1k0d3r)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/H9XCML/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/H9XCML/feedback/</feedback_url>
            </event>
            <event guid='38303106-fcaa-5024-93f0-2b83ced24439' id='587'>
                <room>Ville-Marie</room>
                <title>Finding signals in the noise: Why write exploits when attackers share them for free?</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-17T15:15:00-04:00</date>
                <start>15:15</start>
                <duration>00:30</duration>
                <abstract>Did you know that ransomware groups are actually generous? They&apos;re so generous, in fact, that after putting all their time and effort into writing an exploit, they just share it with the internet for free! At GreyNoise, we&apos;ve made it our mission to detect and categorize all traffic blasted onto the internet, which includes old exploits for old vulnerabilities, new exploits for new vulnerabilities, and everything in between. We&apos;ll show you what happens when an experienced exploit developer kicks back and lets others do the hard work - by building and deploying honeypots for emergent threats, we can spend our time analyzing what the baddies are up to, which vulnerabilities are actually being exploited, and who&apos;s being naughty. This talk will include real-world exploitation examples, including examples of exploits that would go on to join the Known Exploited Vulnerabilities (KEV) list. We&apos;ll Armed with that information, security teams can use their limited resources much more efficiently by prioritizing the vulnerabilities that are under attack!</abstract>
                <slug>2024-587-finding-signals-in-the-noise-why-write-exploits-when-attackers-share-them-for-free-</slug>
                <track>Other</track>
                
                <persons>
                    <person id='26'>Ron Bowes</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/DAQGMD/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/DAQGMD/feedback/</feedback_url>
            </event>
            <event guid='5e7d2669-9a4c-5240-8a96-612e06a8e4ff' id='607'>
                <room>Ville-Marie</room>
                <title>Redefining Digital Security: A New Approach for IPV Victims</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 1 [EN]</type>
                <date>2024-05-17T16:00:00-04:00</date>
                <start>16:00</start>
                <duration>00:30</duration>
                <abstract>This presentation, informed by a collaborative research project led by CDEACF, the Alliance des Maisons 2e &#201;tape and the Lab-2038, addresses the critical need for specialized digital privacy strategies in support of Intimate Partner Violence (IPV) victims. Rather than looking at what advices security experts can give to IPV victims, we  investigate how user experience, security settings and data governance pratices can directly impact their digital and physical safety. Our research highlights how generic, one-size-fits-all threat modelling and security policies by providers, including internet service providers, can inadvertently burden IPV victims. The talk emphasizes the importance of developing nuanced, victim-centred digital security approaches that acknowledge the unique challenges faced by IPV victims. It advocates for a collaborative effort among service providers, technologists, and social welfare experts to create more sensitive and effective digital privacy solutions tailored to the needs of IPV victims.</abstract>
                <slug>2024-607-redefining-digital-security-a-new-approach-for-ipv-victims</slug>
                <track>Other</track>
                
                <persons>
                    <person id='471'>Corinne Pulgar</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/YBZPSB/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/YBZPSB/feedback/</feedback_url>
            </event>
            <event guid='a82705b2-a5ec-5caf-ae25-bfbd1845d802' id='642'>
                <room>Ville-Marie</room>
                <title>Lightning Talks</title>
                <subtitle></subtitle>
                <type>Panel discussion and Q&amp;A</type>
                <date>2024-05-17T16:45:00-04:00</date>
                <start>16:45</start>
                <duration>00:30</duration>
                <abstract>Lightning talks by the community for the community!

5 minutes, no sales pitches!

To enter, fill the form: https://forms.gle/fuUevAiRG3TaNHn77</abstract>
                <slug>2024-642-lightning-talks</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/CPCSGX/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/CPCSGX/feedback/</feedback_url>
            </event>
            <event guid='e3e3ac6c-bf44-5c93-b244-ce45c6c51dff' id='669'>
                <room>Ville-Marie</room>
                <title>Fermeture Conference Closing</title>
                <subtitle></subtitle>
                <type>Opening Remarks</type>
                <date>2024-05-17T17:15:00-04:00</date>
                <start>17:15</start>
                <duration>00:15</duration>
                <abstract>Closing conference remarks // Fermeture de la conf&#233;rence</abstract>
                <slug>2024-669-fermeture-conference-closing</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/7PVGSW/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/7PVGSW/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Salle de Bal' guid='350b63ea-43b0-53ed-a01f-32d611f4e8f9'>
            <event guid='39fd384e-61f6-5a7e-b457-1052222e5a5b' id='636'>
                <room>Salle de Bal</room>
                <title>Heartbleed, ten years later</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-17T09:15:00-04:00</date>
                <start>09:15</start>
                <duration>00:30</duration>
                <abstract>This year marks the ten-year anniversary of Heartbleed&#8217;s discovery and public disclosure. Heartbleed was a severe flaw in the OpenSSL cryptographic library. It was publicly disclosed on April 7, 2014, initiating a long and arduous process of remediation for more than two thirds of all web servers on the internet. Anybody could potentially eavesdrop on communications, steal data or impersonate users for any vulnerable service or device, without leaving a trace. Described by some experts as &#8220;one of the most consequential vulnerability since the advent of the commercial internet&#8221;, Heartbleed abruptly unveiled the insecure and unsustainable foundations on which the internet infrastructure was built. How could so many major organizations (Google, Amazon, Facebook, financial and government institutions) depend on OpenSSL, a struggling free software project with one overworked full-time developer and $2,000 in yearly donations? How could they integrate its code without any proper security audit or reciprocal financial support? This presentation traces the historical roots of the OpenSSL project and its growing adoption, from the mid 1990s up to 2014. Based on original interviews with OpenSSL developers and security experts as well as extensive archival research, it portrays a nascent cryptographic library written &#8220;as a learning exercise&#8221; during the turmoil of the Crypto Wars of the 1990s. Finally, this presentation explores some of the long-lasting effects Heartbleed has had on the tech industry and free software community &#8211; effects that still resonate to this day, ten years later.</abstract>
                <slug>2024-636-heartbleed-ten-years-later</slug>
                <track>Other</track>
                
                <persons>
                    <person id='495'>Louis Melan&#231;on</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/9PRFYS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/9PRFYS/feedback/</feedback_url>
            </event>
            <event guid='86f8514f-e058-5016-8049-8094907d303e' id='628'>
                <room>Salle de Bal</room>
                <title>GraphRunner and Defending Your Microsoft Tenant</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-17T10:00:00-04:00</date>
                <start>10:00</start>
                <duration>00:30</duration>
                <abstract>For organizations using Microsoft Entra ID (formerly known as Azure Active Directory) and O365, it&#8217;s fairly well understood that a set of default logs are readily available for use, no matter what log management tooling an organization is using. However, this standard logging has its limits.

Last fall, the team at Black Hills Information Security released a post exploitation kit called GraphRunner. This tool is focused on interacting with the Microsoft Graph API, which is the backbone that services Entra ID, O365 and many other services in the Microsoft cloud. The release of GraphRunner and future tools like it streamlines a number of activities that an adversary would perform after gaining access, making it simpler for anyone to use. While GraphRunner is a post exploitation toolkit, there are authentication functions that highlight how adversaries could use the OAuth authorization code flow to their advantage.

As a defender, this presents a set of challenges. Less sophisticated adversaries have a lower barrier to entry once they have gained access to the Graph API than they did before. It also highlights that the standard logging may not be sufficient to gain visibility into actions like the refreshing of tokens or other activities that a tool like GraphRunner provides.

This talk is designed to provide insight into additional data sets that Microsoft cloud users have access to but may not be as widely deployed. These additional data sets can provide defenders additional insight, detect suspicious activity and can serve as a hunting ground when confronted with an adversary using techniques like those found in GraphRunner.

Because GraphRunner contains numerous modules and is written in PowerShell, an adversary can customize it to their own needs. While we won&#8217;t be able to cover all possible permutations, our goal is to identify data sets and events that can assist defenders while using GraphRunner as a representative of the kinds of methods that adversaries might use.

Attendees will come away from this talk with:
-A greater understanding of GraphRunner and its capabilities
-Awareness of the logging available for the Graph API beyond the standard logging
-Ideas around how detections and hunts can be designed to identify GraphRunner activity</abstract>
                <slug>2024-628-graphrunner-and-defending-your-microsoft-tenant</slug>
                <track>Other</track>
                
                <persons>
                    <person id='490'>John Stoner</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/3PL9BZ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/3PL9BZ/feedback/</feedback_url>
            </event>
            <event guid='6a4fcc1c-ca47-5bdc-987d-2181ea504a40' id='618'>
                <room>Salle de Bal</room>
                <title>Jupyter Jetpack: Automating Cloud Threat Hunting</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-17T10:45:00-04:00</date>
                <start>10:45</start>
                <duration>00:30</duration>
                <abstract>The talk will outline detection and threat hunting strategies that could be easily adopted by a mature SOC to look for threats in their Cloud (O365 and AWS) environment. I&apos;ll be introducing a Jupyter notebook containing detections mapped to the MITRE ATT&amp;CK framework and threat hunting methodologies backed by unsupervised machine learning. We will take a look at huge datasets using visualizations to find anomalies. These anomalies would be converted into High-Fidelity Detection, along with some ideas to extend this hunt to IAM Platforms like OKTA</abstract>
                <slug>2024-618-jupyter-jetpack-automating-cloud-threat-hunting</slug>
                <track>Other</track>
                
                <persons>
                    <person id='479'>Kai Iyer</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/AT7P8Y/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/AT7P8Y/feedback/</feedback_url>
            </event>
            <event guid='61b3fea3-3948-5313-89be-6dcf0302aa06' id='581'>
                <room>Salle de Bal</room>
                <title>Double Trouble: Unmasking Twin Phishing Campaigns Targeting E-commerce and Travel Sites</title>
                <subtitle></subtitle>
                <type>Talk &#8211; Round 2 [EN]</type>
                <date>2024-05-17T11:30:00-04:00</date>
                <start>11:30</start>
                <duration>00:30</duration>
                <abstract>In today&apos;s technology-driven landscape, the transition to digital transactions has eclipsed conventional face-to-face interactions, presenting novel challenges in ensuring transaction security. Users, perhaps inadvertently, heighten security risks by opening email attachments from phishing attempts, intensifying the complexities of online transaction security. Moreover, there exists the potential of voluntarily disclosing sensitive information, further adding intricacy to the digital transaction security landscape.

Compounding this issue, cyber attacks leverage customer data pilfered from compromised merchants. Victims find themselves coerced into divulging credit card details through a sophisticated, multi-step process. This research brings to light a new phishing campaign, unraveling the techniques, tactics, procedures (TTPs), and indicators of compromise (IoCs) employed by threat actors. These encompass the exploitation of the platform&apos;s chat function and the incorporation of transaction data to bolster the credibility of phishing pages.

The cyber attacks, though strikingly similar, employ urgent language and intimate knowledge of users&apos; bookings, instilling credibility in deceitful messages. However, distinctive cues like odd URLs and typos serve as saviors for potential victims. Upon analysis, these campaigns redirect users to counterfeit sites that mirror legitimate e-commerce platforms. The craftiness of cyber criminals shines through identical HTML elements and scripts, meticulously validating data and even circumventing multi-factor authentication.

Further investigation unveils the tactics employed by cyber thieves: exploiting InfoStealer malware to breach hotel chat systems and amass valuable customer data, escalating their targeted attacks. Open-source intelligence tools reveal a broader scope, a twin campaign where attackers impersonating various platforms, not limited to travel sites but also other e-commerce platforms, since 2021. Domain fronting is also consistently employed to conceal their tracks along with some other TTPs.

The research culminates in insights and recommendations to enhance the security of all parties involved. By implementing these suggestions, it is hoped that both platforms and merchant-customers can fortify their resilience, mitigating potential risks in the dynamic digital landscape.</abstract>
                <slug>2024-581-double-trouble-unmasking-twin-phishing-campaigns-targeting-e-commerce-and-travel-sites</slug>
                <track>Other</track>
                
                <persons>
                    <person id='150'>Mangatas Tondang (@tas_kmanager)</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/YZXSDH/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/YZXSDH/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop 1' guid='341e5ac0-0ff7-5a52-8084-5875a97825ba'>
            <event guid='b2f4c6b0-aac0-5ba6-bade-0110c21db8d5' id='622'>
                <room>Workshop 1</room>
                <title>Reversing Rust Binaries: One step beyond strings</title>
                <subtitle></subtitle>
                <type>3hr workshop -- Round 2 [EN]</type>
                <date>2024-05-17T09:00:00-04:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>Are you a seasoned reverse engineer, but you tremble when a Rust binary lands on your desk? When you encounter a Rust binary, do you just run `strings` on it and hope for the best?

We will take a single problem - string recovery from a Rust binary - and uses it as an approachable starting point for exploring reversing Rust binaries. We will cover:

- What are the practical steps we need to take to recover strings? How are strings represented in memory, passed between functions, and manipulated throughout the program?

- Once we recover the strings, what do the strings mean? What can the strings we recover tell us about the compiler, language runtime, standard library, and third-party libraries in the binary?

This workshop is intended for reverse engineers and malware analysts who are familiar with reversing C or C++ binaries, but who are unfamiliar with the Rust programming language.</abstract>
                <slug>2024-622-reversing-rust-binaries-one-step-beyond-strings</slug>
                <track></track>
                
                <persons>
                    <person id='485'>Cindy Xiao</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/JLME7J/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/JLME7J/feedback/</feedback_url>
            </event>
            <event guid='82b53bcf-ab3c-5913-a95f-3e1153f9ddf9' id='630'>
                <room>Workshop 1</room>
                <title>Machine Learning For Security Professionals: Building And Hacking ML Systems</title>
                <subtitle></subtitle>
                <type>3hr workshop -- Round 2 [EN]</type>
                <date>2024-05-17T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>03:00</duration>
                <abstract>Our training provides an intuitive introduction to machine learning for security professionals with no prior knowledge of mathematics or ML. In the ML4SEC section attendees will gain hands-on experience building MLpowered defensive and offensive security tools using popular libraries like Tensorflow, Keras, Pytorch, and sklearn. We&#8217;ll cover the entire ML pipeline, from pre-processing data to building, training, evaluating, and predicting with ML models. In the SEC4ML section we&#8217;ll address vulnerabilities in state-of-the-art machine learning methodologies, including adversarial learning, model stealing, data poisoning, and model inference. Participants will work with vulnerable ML applications to gain a thorough understanding of these vulnerabilities and learn possible mitigation strategies. Our training provides practical knowledge that security
professionals can apply in their work</abstract>
                <slug>2024-630-machine-learning-for-security-professionals-building-and-hacking-ml-systems</slug>
                <track></track>
                
                <persons>
                    <person id='488'>Sagar Bhure</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/998BPC/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/998BPC/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Workshop 2' guid='533f67c8-e191-5bf5-9ef8-83c3f477739b'>
            <event guid='99e254dc-9fc8-5233-b2e0-f3c0be7384ea' id='590'>
                <room>Workshop 2</room>
                <title>Exploiter Ansible WorX et tout le reste</title>
                <subtitle></subtitle>
                <type>3hr workshop -- Round 2 [EN]</type>
                <date>2024-05-17T09:00:00-04:00</date>
                <start>09:00</start>
                <duration>03:00</duration>
                <abstract>Ansible WorX (AWX), la version libre de Ansible Tower, sert &#224; g&#233;rer des serveurs &#224; distance de fa&#231;on centralis&#233;e. L&#8217;application permet de simplifier la gestion des serveurs en s&#8217;appuyant sur la puissance de Ansible et en ajoutant des fonctionnalit&#233;s de gestion d&#8217;inventaire et d&apos;autorisations. Cependant, qui dit centralisation, dit souvent unique point de rupture.

Pour les attaquants, AWX est une cible de choix. Si des acc&#232;s &#224; la plateforme sont compromis, il est primordial de savoir l&#8217;auditer. Il serait facile de causer des incidents et des pertes de service, et c&#8217;est &#224; &#233;viter &#224; tout prix. Ceci-dit la r&#233;compense de l&#8217;utilisation des acc&#232;s obtenus se compte souvent en dizaines de serveurs compromis. Il s&#8217;agit donc d&#8217; un impact majeur pour une organisation.

Dans cet atelier, vous apprendrez les diff&#233;rents concepts reli&#233;s &#224; AWX et Ansible. Vous apprendrez &#233;galement &#224; utiliser des acc&#232;s &#224; AWX dans l&#8217;objectif de compromettre les serveurs g&#233;r&#233;s par la plateforme. Divers sc&#233;narios et m&#233;thodes seront abord&#233;s pour &#234;tre pr&#234;t &#224; toutes &#233;ventualit&#233;s.

Dans le but d&#8217;un atelier le plus fluide possible, s&#8217;il-vous-pla&#238;t, pr&#233;-installez AWX CLI.</abstract>
                <slug>2024-590-exploiter-ansible-worx-et-tout-le-reste</slug>
                <track></track>
                
                <persons>
                    <person id='452'>Simon Lacasse</person><person id='462'>Charl-alexandre Le Brun</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/U8ABLY/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/U8ABLY/feedback/</feedback_url>
            </event>
            <event guid='c9b31cdf-35d8-55a9-bf1e-1b6779a9a28f' id='597'>
                <room>Workshop 2</room>
                <title>Toolbox for reverse engineering and binary exploitation</title>
                <subtitle></subtitle>
                <type>3hr workshop -- Round 1  [EN]</type>
                <date>2024-05-17T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>03:00</duration>
                <abstract>The objective of the workshop is to learn how to use some powerful but intimidating tools while reverse engineering IOT devices: Angr, Unicorn and Qiling.

The workshop aim to show common use cases for each of these tools and also their limits.

To that end, the workshop will propose the following exercices:

* Decipher XOR encrypted strings with Angr
* Automated buffer overflow exploitation with Angr
* Emulation of arbitrary function or code blocks with Unicorn
* Binary emulation with Qiling
* Complete device emulation after firmware extraction with Renode</abstract>
                <slug>2024-597-toolbox-for-reverse-engineering-and-binary-exploitation</slug>
                <track></track>
                
                <persons>
                    <person id='59'>Marc-Andr&#233; Labont&#233;</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/EJAXLP/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/EJAXLP/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Salle de la Commune' guid='91c72a02-5477-53b5-be2a-f89fcc3ad7a2'>
            <event guid='572b8a8f-3f5a-5a53-a50e-cf4ef5c55d72' id='656'>
                <room>Salle de la Commune</room>
                <title>Friday Community Booths / Kiosques communautaires du vendredi</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-17T09:30:00-04:00</date>
                <start>09:30</start>
                <duration>06:00</duration>
                <abstract>English below

Vous &#234;tes cordialement invit&#233;s &#224; venir explorer la salle communautaire, o&#249; la convergence de la technologie, de l&apos;amusement et de l&apos;apprentissage vous attend. Que vous soyez un amateur de jeux, un technophile averti ou simplement curieux de d&#233;couvrir de nouvelles choses, on vous y attend!

D&#233;couvrez nos kiosques :

* Guys, Games and Beer (G2B)
* Cybercap
* Jeux de table
* &#201;changes d&apos;auto-collants
* Foulab
* Crochetage de serrures
* Vol &#224; la tire : De retour pour une troisi&#232;me ann&#233;e, James Harrison r&#233;alisera ses techniques de prestidigitation &#233;poustouflantes de pr&#232;s. Vous pourriez m&#234;me apprendre un tour ou deux !
* Atelier de CV

et plus encore

//  English //
You are cordially invited to come explore the community hall, where the convergence of technology, fun, and learning awaits you. Whether you&apos;re a gaming enthusiast, a seasoned technophile, or simply curious to discover new things, we&apos;ll be expecting you there!

* Guys, Games and Beer (G2B)
* Cybercap 
* Tabletop games
* Sticker exchange
* Foulab
* Lockpicking
* Pickpocketing : Come learn and be amazed by Canada&apos;s Pickpocket Magician! Back for a third year, James Harrison will perform his mindblowing sleigh of hand techniques up close. You might even learn a trick or two!
* HR village

and much more!</abstract>
                <slug>2024-656-friday-community-booths-kiosques-communautaires-du-vendredi</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/DPNKWF/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/DPNKWF/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Sc&#232;ne de la Commune' guid='b1da90d6-0a93-5b0a-a07e-3fa357a1d968'>
            <event guid='c0f6543e-67a8-5d04-a020-1368e32066df' id='664'>
                <room>Sc&#232;ne de la Commune</room>
                <title>Guys Games and Beer Podcast Recording - Cybersecurity in the Video Game Industry</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-17T13:15:00-04:00</date>
                <start>13:15</start>
                <duration>00:45</duration>
                <abstract>Podcast recording in front of a live audience in English. Contact us in #villages on Discord to be interviewed!

More info: &lt;a href=&quot;https://www.facebook.com/GuysGamesAndBeer&quot; target=&quot;_blank&quot;&gt;https://www.facebook.com/GuysGamesAndBeer&lt;/a&gt;</abstract>
                <slug>2024-664-guys-games-and-beer-podcast-recording-cybersecurity-in-the-video-game-industry</slug>
                <track>Other</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/VGD7GT/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/VGD7GT/feedback/</feedback_url>
            </event>
            <event guid='911eb54d-04a3-5336-9592-5b394b34431a' id='682'>
                <room>Sc&#232;ne de la Commune</room>
                <title>I will look for you and I will find you: OSINT Extras</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-17T15:15:00-04:00</date>
                <start>15:15</start>
                <duration>01:00</duration>
                <abstract>If you&apos;ve enjoyed https://nsec.io/session/2024-i-will-look-for-you-and-i-will-find-you-osint-on-publicly-shared-pictures.html, or if you&apos;ve missed it, this session is not to be missed! Patricia will cover contents that didn&apos;t fit in the condensed talk format.</abstract>
                <slug>2024-682-i-will-look-for-you-and-i-will-find-you-osint-extras</slug>
                <track>Human in the Middle</track>
                
                <persons>
                    <person id='473'>Patricia Gagnon-Renaud</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/8MGKPT/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/8MGKPT/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Soldering Village' guid='d5a7e161-7991-5141-884f-e29c468b56dc'>
            <event guid='6d7e3fd1-cda5-5cff-8257-e5066a0f895a' id='657'>
                <room>Soldering Village</room>
                <title>Soldering village / Village de la soudure</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-17T09:30:00-04:00</date>
                <start>09:30</start>
                <duration>03:00</duration>
                <abstract>Open all day // Ouvert toute la journ&#233;e
Venez apprendre ou perfectionner votre technique de brasage! Nos b&#233;n&#233;voles sauront vous aider &#224; vous initier ou vous am&#233;liorer. Premier arriv&#233;, premier servi!

Come learn or perfect your soldering technique! Our volunteers will be able to help you get started or improve. First come, first served!</abstract>
                <slug>2024-657-soldering-village-village-de-la-soudure</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/RSTZ98/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/RSTZ98/feedback/</feedback_url>
            </event>
            <event guid='df4205e1-793b-5a85-a5d7-244fa0743175' id='662'>
                <room>Soldering Village</room>
                <title>Soldering Workshop - Day 2 / Atelier de soudure - Jour 2</title>
                <subtitle></subtitle>
                <type>Community Room (Villages)</type>
                <date>2024-05-17T13:00:00-04:00</date>
                <start>13:00</start>
                <duration>02:00</duration>
                <abstract>REGISTRATION REQUIRED HERE / INSCRIPTION OBLIGATOIRE ICI : https://tickets.nsec.io/2024/

Soldering (EN below) / Soudure (brasage)

Rejoignez-nous pour un atelier pratique de brasage o&#249; vous d&#233;couvrirez les secrets de vos badges (apportez votre badge Sputnik ou Cerveau!). 

Dans cet atelier passionnant, vous apprendrez les techniques de brasage tout en donnant une nouvelle vie &#224; vos badges. Apprenez &#224; hacker votre badge pour lui donner de nouvelles fonctionnalit&#233;s et le personnaliser. 

C&apos;est une occasion unique de d&#233;velopper vos comp&#233;tences en &#233;lectronique tout en repartant avec un souvenir unique et personnalis&#233; ! L&apos;atelier sera offert en anglais.

INSCRIPTION OBLIGATOIRE ICI : https://tickets.nsec.io/2024/



Join us for a hands-on soldering workshop where you&apos;ll uncover the secrets of crafting your own electronic badge - bring your Brain or Sputnik badge if you have one! 

In this exciting workshop, you&apos;ll learn soldering techniques while breathing new life into your (Sputnik/Brain) badge. Learn to hack your badge to add new features and customize it to your heart&apos;s content. It&apos;s a unique opportunity to enhance your electronics skills while walking away with a one-of-a-kind, personalized keepsake!

(an additional fee is required to cover the cost of materials, REGISTRATION REQUIRED HERE  : https://tickets.nsec.io/2024/</abstract>
                <slug>2024-662-soldering-workshop-day-2-atelier-de-soudure-jour-2</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/AFFKRT/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/AFFKRT/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='CTF' guid='8d1f1fd7-6dfc-5535-9257-45601e7a6cae'>
            <event guid='0a953df3-d453-53b5-9840-f38fcf2a7261' id='672'>
                <room>CTF</room>
                <title>CTF Salle de Bal Registration / Enregistrement</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-17T18:00:00-04:00</date>
                <start>18:00</start>
                <duration>01:00</duration>
                <abstract>Setup your table // Installez vous</abstract>
                <slug>2024-672-ctf-salle-de-bal-registration-enregistrement</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/3QYAEM/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/3QYAEM/feedback/</feedback_url>
            </event>
            <event guid='864aad84-2677-532a-ad0f-ec515e2831e3' id='673'>
                <room>CTF</room>
                <title>CTF Salle de la commune Registration / Enregistrement</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-17T19:00:00-04:00</date>
                <start>19:00</start>
                <duration>01:00</duration>
                <abstract>Setup your table // Installez-vous</abstract>
                <slug>2024-673-ctf-salle-de-la-commune-registration-enregistrement</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/TFRNFP/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/TFRNFP/feedback/</feedback_url>
            </event>
            <event guid='09043105-ab58-5d98-b0e8-3053cdaee030' id='675'>
                <room>CTF</room>
                <title>The CTF Begins // Ouverture du CTF</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-17T20:00:00-04:00</date>
                <start>20:00</start>
                <duration>00:30</duration>
                <abstract>Opening speeches: Welcome by Emile and Theme reveal by Eric. Sponsored speech by Boost Security.

//

Discours de bienvenue par &#201;mile et r&#233;v&#233;lation du th&#232;me par Eric. Discours de notre commanditaire Boost Security.</abstract>
                <slug>2024-675-the-ctf-begins-ouverture-du-ctf</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/JHPCB9/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/JHPCB9/feedback/</feedback_url>
            </event>
            <event guid='59e2341b-2970-5c22-80cd-8f06fbd1a171' id='677'>
                <room>CTF</room>
                <title>CTF Day 1 // Competition Jour 1</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-17T20:30:00-04:00</date>
                <start>20:30</start>
                <duration>06:30</duration>
                <abstract>Get all the flags, learn on the way. // Obtenez tous les drapeaux, apprenez au passage.</abstract>
                <slug>2024-677-ctf-day-1-competition-jour-1</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/PSNNCB/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/PSNNCB/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='3' date='2024-05-18' start='2024-05-18T04:00:00-04:00' end='2024-05-19T03:59:00-04:00'>
        <room name='CTF' guid='8d1f1fd7-6dfc-5535-9257-45601e7a6cae'>
            <event guid='692e2385-cb07-5fef-867b-4a304bcb1940' id='671'>
                <room>CTF</room>
                <title>Ouverture de la comp&#233;tition jour 2 // CTF Opening Day 2</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-18T08:00:00-04:00</date>
                <start>08:00</start>
                <duration>01:00</duration>
                <abstract>&lt;img alt=&quot;Corsek&quot; src=&quot;https://nsec.io/img/partners/corsek.svg&quot; width=&quot;150px&quot; style=&quot;float: right&quot; /&gt;&lt;p&gt;Ouverture du service de garde // Day care opens&lt;/p&gt;

&#129360; &#9749; &#129391; &#129475; Breakfast sponsored by Corsek // D&#233;jeuner gr&#226;ce &#224; Corsek</abstract>
                <slug>2024-671-ouverture-de-la-comptition-jour-2-ctf-opening-day-2</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/SDVMYS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/SDVMYS/feedback/</feedback_url>
            </event>
            <event guid='84cc4513-cd43-5be1-8d33-33adf3cd776e' id='678'>
                <room>CTF</room>
                <title>CTF Day 2 // Comp&#233;tition jour 2</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-18T09:00:00-04:00</date>
                <start>09:00</start>
                <duration>12:00</duration>
                <abstract>Get all the flags, learn on the way. // Obtenez tous les drapeaux, apprenez au passage.</abstract>
                <slug>2024-678-ctf-day-2-comptition-jour-2</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/BHGMG9/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/BHGMG9/feedback/</feedback_url>
            </event>
            <event guid='11dbfbe5-abeb-5d37-848b-160558c0c3e2' id='670'>
                <room>CTF</room>
                <title>Hacker Jeopardy</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-18T21:00:00-04:00</date>
                <start>21:00</start>
                <duration>02:00</duration>
                <abstract>&lt;img alt=&quot;Corsek&quot; src=&quot;https://nsec.io/img/partners/corsek.svg&quot; width=&quot;150px&quot; style=&quot;float: right&quot; /&gt;&lt;p&gt;The classic Hacker Jeopardy at NorthSec. Hackers answer weird and obscure clues for your entertainment! In the form of a question!!!&lt;/p&gt;

//

Le Hacker Jeopardy classique de NorthSec. Des participants r&#233;pondent a des &#233;nigmes &#233;tranges et obscures pour le divertissement de tous! Sous la forme d&apos;une question!! &#201;v&#233;nement en anglais.

Event sponsored by Corsek // &#201;v&#233;nement commandit&#233; par Corsek</abstract>
                <slug>2024-670-hacker-jeopardy</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/X39DX9/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/X39DX9/feedback/</feedback_url>
            </event>
            <event guid='a7918ec4-b9f8-5dbe-83a7-52c8bd4b35c8' id='680'>
                <room>CTF</room>
                <title>Post-Jeopardy Pizza!</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-18T23:00:00-04:00</date>
                <start>23:00</start>
                <duration>00:30</duration>
                <abstract>&lt;img alt=&quot;Okiok&quot; src=&quot;https://nsec.io/img/partners/okiok.png&quot; width=&quot;150px&quot; style=&quot;float: right&quot; /&gt;La classique pizza post-Jeopardy commandit&#233;e par Okiok.

The classic post-Jeopardy pizza sponsored by Okiok.</abstract>
                <slug>2024-680-post-jeopardy-pizza-</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/F9Z3MQ/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/F9Z3MQ/feedback/</feedback_url>
            </event>
            <event guid='96c71235-eb62-556f-86ed-eb1a6defd846' id='681'>
                <room>CTF</room>
                <title>CTF Day 2 (cont.) // Comp&#233;tition jour 2 (suite)</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-18T23:30:00-04:00</date>
                <start>23:30</start>
                <duration>03:30</duration>
                <abstract>Get all the flags, learn on the way. // Obtenez tous les drapeaux, apprenez au passage.</abstract>
                <slug>2024-681-ctf-day-2-cont-comptition-jour-2-suite-</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/M9B7ME/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/M9B7ME/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='4' date='2024-05-19' start='2024-05-19T04:00:00-04:00' end='2024-05-20T03:59:00-04:00'>
        <room name='CTF' guid='8d1f1fd7-6dfc-5535-9257-45601e7a6cae'>
            <event guid='903dcdbc-203f-5036-9e81-c1e49e9c40ec' id='679'>
                <room>CTF</room>
                <title>CTF Day 3 // Comp&#233;tition jour 3</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-19T08:00:00-04:00</date>
                <start>08:00</start>
                <duration>07:00</duration>
                <abstract>&lt;img alt=&quot;Google&quot; src=&quot;https://nsec.io/img/partners/google.png&quot; width=&quot;200px&quot; style=&quot;float: right&quot; /&gt;Get all the flags, learn on the way. Refreshments sponsored by Google. // Obtenez tous les drapeaux, apprenez au passage. Les rafra&#238;chissements sont une gracieuset&#233; de Google.</abstract>
                <slug>2024-679-ctf-day-3-comptition-jour-3</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/VHY9VS/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/VHY9VS/feedback/</feedback_url>
            </event>
            <event guid='13673945-acff-5360-ba77-45a25271bc79' id='676'>
                <room>CTF</room>
                <title>CTF Closing Ceremony // C&#233;r&#233;monie de clot&#251;re du CTF</title>
                <subtitle></subtitle>
                <type>CTF</type>
                <date>2024-05-19T15:30:00-04:00</date>
                <start>15:30</start>
                <duration>01:00</duration>
                <abstract>Closing speech by the NorthSec crew. Sponsored speech by Okiok.

//

Discours de fermeture par l&apos;&#233;quipe de NorthSec. Discours de notre partenaire Okiok.</abstract>
                <slug>2024-676-ctf-closing-ceremony-crmonie-de-clotre-du-ctf</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://cfp.nsec.io/2024/talk/MB3BAT/</url>
                <feedback_url>https://cfp.nsec.io/2024/talk/MB3BAT/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
